Page 1011 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1011

B.  It indicates that the sensitivity is too low.

                    C.  It indicates the point where the false rejection rate equals the
                        false acceptance rate.


                    D.  When high enough, it indicates the biometric device is highly
                        accurate.

               14.  Sally has a user account and has previously logged on using a
                    biometric system. Today, the biometric system didn’t recognize her
                    so she wasn’t able to log on. What best describes this?

                    A.  False rejection

                    B.  False acceptance

                    C.  Crossover error


                    D.  Equal error

               15.  What is the primary purpose of Kerberos?

                    A.  Confidentiality

                    B.  Integrity

                    C.  Authentication

                    D.  Accountability

               16.  Which of the following is the best choice to support a federated
                    identity management (FIM) system?

                    A.  Kerberos

                    B.  Hypertext Markup Language (HTML)


                    C.  Extensible Markup Language (XML)

                    D.  Security Assertion Markup Language (SAML)

               17.  What is the function of the network access server within a RADIUS
                    architecture?

                    A.  Authentication server

                    B.  Client

                    C.  AAA server
   1006   1007   1008   1009   1010   1011   1012   1013   1014   1015   1016